Artificial Immunity-Based Security Response Model for the Internet of Things

Total Page:16

File Type:pdf, Size:1020Kb

Artificial Immunity-Based Security Response Model for the Internet of Things JOURNAL OF COMPUTERS, VOL. 8, NO. 12, DECEMBER 2013 3111 Artificial Immunity-based Security Response Model for the Internet of Things Caiming Liu School of Information Science & Technology, Southwest Jiaotong University, Chengdu, China School of Computer Science, Leshan Normal University, Leshan, China Email: [email protected] Yan Zhang*, Zongyin Cai School of Computer Science, Leshan Normal University, Leshan, China Email: [email protected] Jin Yang School of Computer Science, Leshan Normal University, Leshan, China School of Information Science & Technology, Southwest Jiaotong University, Chengdu, China Email: [email protected] Lingxi Peng Department of Computer and Education Software, Guangzhou University, Guangzhou, China Email: [email protected] Abstract—Rapid expansion of the Internet of Things (IoT) open surrounding [3] and not availably defended. Hostile caused more and more security problems and attacks in intruders can relatively easily attack IoT systems through particular. Secure IoT needs reasonable disposition after or accessing sense nodes. Massive data coming from or when being attacked. To meet the above requirements of going to the sense layer of IoT may suffer losses. The IoT security, a security response model for IoT based on security situation is not optimistic. artificial immune system is proposed in this paper. IoT data packets are captured and transformed into immune The security problems of IoT have attracted high antigens which are defined in the real IoT security attention of researchers. The current research is mainly environment. Recognizer is defined and simulative to focused on privacy protection [4, 5], security model [6, 7], recognize harmful antigens. The immune mechanisms of and etc. However, these security theories and antigen match, dynamic evolution of recognizer and self technologies were restricted to static defense concept. elements are simulative to adapt the real-time change of IoT. Flexible adaptation to real IoT security environment and Abnormal antigens are recognized and their danger value is reasonable response to real-time IoT security events are assessed. Strategy library of security response is constructed. urgent to be solved. Based on the danger of abnormal antigens which represent The security environment of IoT is changeful in real- specific IoT data, reasonable security response array is calculated to respond to attacks. Experiments are simulative time. The strategy of attack detection and response is not to realize proposed model. Their results show feasibility and immutable. Static response methods for attacks effectiveness in security response for IoT. threatening IoT applications have changeless strategy and can not meets the requirements of security response. Index Terms—Internet of Things, Artificial Immune System, Reasonable response theories and technologies needs to Security Response, Attack be adaptive to different situations. Intelligent computation measures are worth being taken into account to resolve above-mentioned problems. In this paper, Artificial I. INTRODUCTION Immune System (AIS) [8] which is one of the most active The Internet of Things (IoT) [1] is confronted with intelligent computation methods and has the attributes similar security problems to traditional computer self-learning and self-adaptation is used to resolve the networks [2]. In addition, it has its specific complicated adaptive response problems for IoT. security environment. A lot of sense nodes are exposed to AIS imitates the excellent principles and mechanisms of Biological Immune System (BIS). It has been a research hotspot in the fields of bionics and computation Manuscript received January 1, 2013; revised June 1, 2013; accepted intelligence. Since 2002, International Conference on July 1, 2013. Artificial Immune Systems has been held 11 times [9]. * Corresponding author, [email protected]. Based on the similarity between BIS and computer security issues, AIS was introduced into information © 2013 ACADEMY PUBLISHER doi:10.4304/jcp.8.12.3111-3118 3112 JOURNAL OF COMPUTERS, VOL. 8, NO. 12, DECEMBER 2013 security by relative researchers. There was much AIS B. Data Preprocessing based research literature [10, 11] in the fields of The original data to be analyzed comes from IoT information security and others in recent years. In the traffic. Fig. 2 illustrates how IoT packets are captured and traditional network security fields, AIS has been applied key data of IoT is got. AISRM captures IoT packets and into computer virus defense, intrusion detection, security extracts the packet head. Source IP address, target IP risk assessment, etc. address, label ID of things, card reader ID, data timestamp and etc that express packet signature are II. PROPOSED SECURITY RESPONSE MODEL extracted from the packet head. The proposed Artificial Immunity-based Security Response Model for the Internet of Things (AISRM) aims at recognizing and responding to attacks against IoT. It simulates the principles and mechanisms of AIS to be adaptive to security response for IoT. A. Architecture of Security Response The architecture of AISRM is shown in Fig. 1. It consists of 5 modules including data preprocessing, simulation of AIS principles, attack recognition, attack danger assessment and security response. Original IoT data is preprocessed and main signature information of IoT packets is got. AISRM simulates AIS data, recognizer and mechanisms to recognize attacks. The simulation makes it run the artificial immune principles in the real environment of IoT. Furthermore, it assesses the danger of recognized abnormal antigen. Moreover, it constructs strategy library of security response. Its ultimate goal is to respond to attacks reasonably. Figure 2. Process of Data Preprocessing. Let the signature set of packet head be SigHead which meets SigHead= { sIP,,,, dIP tID rID stmp } , where, sIP is the source IP address, dIP is the destination IP address, tID and rID means label ID of things and card reader ID, respectively, stmp is the time when the packet is got. Let the IoT data be IoTsig which is shown in Eq. (1). IoTsig =∈=∨∈{ ID, i ID N , i s1 ... sj ... s l s j {} 0,1 (1) ∨∈l N,( i = BinaryString h)∨∀∈ h SigHead} Where, ID is the serial number, i is the primitive data and consists of binary characters, N is nature number set, the function BinaryString( ) is used to transform the head information of IoT packets into binary strings, h is one of elements of SigHead. In Eq. (1), IoTsig contains the signature information of Figure 1. Architecture of AISRM. IoT packet. It comes from the original IoT data. It is generated by the process of data preprocessing which runs 4 steps including packets capturing, packet head extracting, signature extracting and binary string forming. The first step captures the IoT data which flows through IoT gateway and transportation gateway. The second step © 2013 ACADEMY PUBLISHER JOURNAL OF COMPUTERS, VOL. 8, NO. 12, DECEMBER 2013 3113 extracts the heads of IoT packets. The third step extracts the above relative memory, immature and mature signature information of packet head. Finally, the fourth recognizers is the same. It shows that they have the same step transforms IoT signature information into binary ancestors. The domain t exclusively belongs to memory strings which is used to judge whether IoT packets recognizers. It plus 1 makes the current thickness value contain attacks. after the recognizer recognizes a harmful antigen. C. Data Simulation E. Immune Mechanism Simulation To use the principles of AIS, data in the environment AISRM adopts artificial immune mechanisms to make of IoT needs to be simulated into antigen which is in recognizers and self elements can be self-adaptive to the immune style. Antigen in AISRM is defined as Def. 1. change of IoT environment. It takes advantage of dynamic strategy to evolve immune elements. It means Defenition 1. Let antigen set in IoT environment be A that immune elements may be different in different which meets A ===∧∀∈{a a l,. a iot i iot IoTsig }. The moment. Let the data set Ω in the beginning be Ω(0) . elements in A constitute the original data to be classified Let Ω at the moment t be Ω(t) . The simulation of by AISRM. artificial immune mechanisms is described in the following. Normal ones in A belongs to self set which is defined as S. Abnormal ones in A belongs to non-self set which is 1) Antigen Match defined as N. Non-self antigens come from IoT data which contains attacks. They hide in all antigens. AISRM In immune systems, when antigens touch immune cells, uses AIS principles to sort antigens input by the data immune cells recognize antigens through the antibodies preprocessing module into normal ones (self antigens) spreading outside the surface of the immune cells. To and abnormal ones (non-self antigens). Its final target is simulate the mechanism, a match method that recognizers to respond to non-self antigens which may threaten IoT recognize antigens is needed. Presently, feasible potentially. matching methods include Hamming, Euclidean, r- Contiguous, and etc [13]. Most existing literatures on AIS D. Recognizer Simulation based information security adopts r-Contiguous which In the immune system, immune cells are responsible judges whether a group binary string is the same between for recognizing harmful antigens. AISRM uses recognizer and antigen. Some effects of antigen matching recognizers to simulate immune cells to imitate the were achieved in some ways. However, some binary mechanism of the specificity recognition in AIS. characters are the same, but are not contiguous. The Recognizers dynamically evolve to detect attacks against proposed model improves the traditional r-Contiguous IoT. The data set of recognizer is defined as Def. 2. and constructs grouped r-Contiguous match algorithm. It calculates the sum of groups which have the same Defenition 2. Let the data set of recognizer be R which characters and are not near to each other. meets R=∈{ ant,, ag cnt ,,, tp t fam ant U ,, ag cnt ,,, tp t Grouped r-Contiguous match algorithm is used to judge whether recognizer matches antigen. It is shown in fam∈ I} , where, ant is the antibody string, I is Eq.
Recommended publications
  • Theory and Practice in Language Studies Contents
    Theory and Practice in Language Studies ISSN 1799-2591 Volume 8, Number 6, June 2018 Contents REGULAR PAPERS Learning Styles and Motivations for Practicing English as a Foreign Language: A Case Study of 555 Role-play in Two Ecuadorian Universities Jhonny S. Villafuerte, Maria A. Rojas, Sandy L. Hormaza, and Lourdes A. Soledispa Criteria and Scale for Argumentation 564 Chamnong Kaewpet Female Teachers’ Perspectives of Learner Autonomy in the Saudi Context 570 Jameelah Asiri and Nadia Shukri Jordanian Arabic: A Study of the Motivations for the Intentionality in Dialect Change 580 Ahmad M. Saidat Using New Media in Teaching English Reading and Writing for Hearing Impaired Students—Taking 588 Leshan Special Education School as an Example Bo Xu An Analytic Study of Ironic Statements in Ahlam Mistaghanmi’s Their Hearts with Us While Their 595 Bombs Launching towards Us Hayder Tuama Jasim Al-Saedi A Study of Students’ English Cooperative Learning Strategy in the Multimedia Environment 601 Ling Wang The Role of EFL Teacher’s Talk and Identity in Iranian Classroom Context 606 Afsaneh Alijani and Hamed Barjesteh Exploration of the Non-normal Students’ Attitude to Taking Part in the Teacher Qualification 613 Examination in China Lu Gong A Study on English Acquisition from the Perspective of the Multimodal Theory 618 Huaiyu Mu Social Identity and Use of Taboo Words in Angry Mood: A Gender Study 623 Mohammad Hashamdar and Fahimeh Rafi On the Norm Memes in English Translation of Classics—A Case Study of the Translation of the 629 Works by Jiangxi Native
    [Show full text]
  • Research on Industry-University-Research Cooperative Education of Local Normal Universities in China from the Perspective of Teaching Assessment
    Open Access Library Journal 2019, Volume 6, e5361 ISSN Online: 2333-9721 ISSN Print: 2333-9705 Research on Industry-University-Research Cooperative Education of Local Normal Universities in China from the Perspective of Teaching Assessment Xuhong Wang Department Office of Educational Administration, Chengdu Normal University, Chengdu, China How to cite this paper: Wang, X.H. (2019) Abstract Research on Industry-University-Research Cooperative Education of Local Normal Cooperative education is very important in the innovation-oriented national Universities in China from the Perspective of construction. It is an effective way to improve quality of teaching by coopera- Teaching Assessment. Open Access Library tive education of industry, university and research, which plays critical role in Journal, 6: e5361. https://doi.org/10.4236/oalib.1105361 cultivating undergraduates’ practical and innovative ability. This paper ana- lyzes the current situation of cooperative education in local normal universi- Received: March 28, 2019 ties from the perspective of qualification assessment. The internal and exter- Accepted: April 20, 2019 nal factors that influence the depth of cooperative education are discussed. Published: April 23, 2019 Some specific advices are put forward from the aspects of renewing under- Copyright © 2019 by author(s) and Open standing, playing the leading role of governments at all levels and improving Access Library Inc. cooperation mechanism. This work is licensed under the Creative Commons Attribution International License (CC BY 4.0). Subject Areas http://creativecommons.org/licenses/by/4.0/ Education Open Access Keywords Local Normal University, Industry-University-Research Cooperative Education, Teaching Assessment 1. Introduction In the index system of undergraduate teaching qualification assessment, the Ministry of Education requires universities cooperating with enterprises and re- search institution to construct specialties, teaching resources, train talents and promote employment.
    [Show full text]
  • Research on the Influence of Internet on Extracurricular Learning and Life of English Major College Students
    ISSN 1799-2591 Theory and Practice in Language Studies, Vol. 7, No. 8, pp. 695-700, August 2017 DOI: http://dx.doi.org/10.17507/tpls.0708.13 Research on the Influence of Internet on Extracurricular Learning and Life of English Major College Students Yi Yang School of Foreign Language, Leshan Normal University, China Tianquan Qi School of Foreign Language, Leshan Normal University, China Abstract—Informatization is one of the most important characteristics of the current era, Internet (including mobile Internet, called network for short in this paper) is an important medium of information dissemination, and its rapid development speed and penetration rate make the classroom life and extracurricular life of contemporary English major college students inseparable from network. Through the online questionnaire and field research for the influence of network on the extracurricular learning and life of English major college students in some universities in Chengdu, Leshan, Mianyang, Nanchong, and other regions in Sichuan, this paper makes a thorough analysis on the problems found, probes into the influence of network on the extracurricular study and life of English major college students and the consequence, and discusses how to use network to guide, serve and manage the extracurricular learning and life of English major college students. Index Terms—Internet English, major College students, extracurricular learning and life Internet technology in China has gone through the beginning, development and deepening stage since 1994, and it has had a profound influence on the way people think and act, especially on young students. Currently, in the university campus taking post-90s as the main body, network has become an important part of the study and life of English major college students; therefore, how to use network to guide, serve and manage the classroom life and extracurricular life of English major college students has gradually attracted the attention of today’s educators.
    [Show full text]
  • On Exploration and Practice of Application-Oriented Talent Cultivation System of English Related Majors in Local Normal Universities in China
    English Language Teaching; Vol. 12, No. 11; 2019 ISSN 1916-4742 E-ISSN 1916-4750 Published by Canadian Center of Science and Education On Exploration and Practice of Application-Oriented Talent Cultivation System of English Related Majors in Local Normal Universities in China Bo Xu1 1 School of Foreign Languages, Leshan Normal University, Sichuan Province, China Correspondence: Bo Xu, School of Foreign Languages, Leshan Normal University, Sichuan Province, China Received: September 19, 2019 Accepted: October 29, 2019 Online Published: October 31, 2019 doi: 10.5539/elt.v12n11p113 URL: https://doi.org/10.5539/elt.v12n11p113 Abstract Recently, many local normal universities have been carrying out transformation and development project. Leshan Normal University, a local normal university, is prone to change traditional talents cultivation mode. By taking LSNU as an example, this paper attempts to make an exploration on constructing application-oriented talents training system through reconstructing application-oriented talents cultivation system, constructing application-oriented course system, enhancing practice education and training double-qualified teachers. Keywords: application-oriented talent cultivation system, English related majors, Local Normal Universities 1. Introduction On October 26th 2017, the Ministry of Education in China issued implementation measures for teachers’ major certification in universities and colleges. The Ministry of Education issued its key points of work which will implement teachers’ major certification with a high starting point and high standard. Sichuan province will also implement the teachers’ major certification. In January, 2018, the Ministry of Education issued National Standard for Teaching Quality of Undergraduate major, which specified connotation, disciplinary foundations and orientation of talents cultivation, major scope, training objective, training, teaching staff, teaching conditions and the construction of quality guarantee system.
    [Show full text]
  • MCM Problem a Contest Results
    2021 Mathematical Contest in Modeling® Press Release—April 23, 2021 COMAP is pleased to announce the results of the 37th annual advantages and disadvantages for fungi species and combinations of Mathematical Contest in Modeling (MCM). This year, 10,053 teams species like to persist is various environments. representing institutions from fifteen countries/regions participated in the contest. Seventeen teams from the following institutions were The B problem used the scenario of the 2019-2020 fire season in designated as OUTSTANDING WINNERS: Australia, which saw devastating wildfires in every state, to consider the use of drones in firefighting. Teams learned of the capabilities of Shanghai Jiao Tong University, China (3) two types of drones, surveillance and situational awareness drones and (2100454 SIAM Award & COMAP Scholarship Award) hovering drones that can carry repeaters (to extend radio range), and Beijing Institute of Technology, China (Ben Fusaro Award) then created a model to determine the optimal numbers and mix of Nanjing University of Posts & Telecommunications, China these two types of drones. Teams addressed adaptation of their model (Frank Giordano Award & SIAM Award) to the changing likelihood of extreme fire events over the next decade, Jiangnan University, China as well as to equipment cost increases. Teams also developed a model Xi'an Jiaotong University, China (AMS Award) to optimize locations of hovering drones for fires of differing sizes on Xidian University, Shannxi, China differing terrain. Beijing Jiaotong University, China (ASA Award) University of Colorado Boulder, CO, USA The C problem investigated the discovery and sightings of Vespa (MAA Award, SIAM Award & COMAP Scholarship Award) mandarina (also known as the Asian giant hornet) in the State of University of Oxford, United Kingdom Washington.
    [Show full text]
  • Connecting Sichuan
    Connecting Sichuan A landmark partnership to revitalize communities by transforming healthcare, education, and the workforce Rebuilding Better, Together The people of Sichuan suffered great losses when a Social Impact at a Glance massive earthquake devastated their province in May 2008. In addition to significant loss of life, the earthquake Indicator Description Metric as of June 2011 destroyed many schools and hospitals located in rural, Community Counties within Sichuan 8 out of 10 of the hardest hard to reach areas. Cisco, the Cisco Foundation, and our investment benefiting from the program hit counties employees immediately responded by donating more Economic Program social investment US$50 million than US$2.6 million (about RMB 16.8 million) in grants and investment relief funds. But a longer-term response was needed to Building capacity Commercial, NGO, and 40 partners* restore and revitalize the region. Cisco and the Chinese through partners government partners contributing to the program government saw an opportunity for renewal in the midst of the Sichuan destruction—an opportunity to rebuild better, 21st century ICT Number of network-enabled 193 infrastructure healthcare and education together. institutions That vision for a better future resulted in the creation of 21st century skills Investment in professional +9,900 healthcare and development development and ICT skills education professionals a unique public-private partnership, a three-year Cisco trained corporate social responsibility program called Connecting Sichuan. * Excludes healthcare organizations and educational institutions Connecting Sichuan was designed to systematically transform healthcare, education, and the workforce About Sichuan in the province through the use of information and Long known as China’s Province of Abundance, communications technology (ICT).
    [Show full text]
  • A Complete Collection of Chinese Institutes and Universities For
    Study in China——All China Universities All China Universities 2019.12 Please download WeChat app and follow our official account (scan QR code below or add WeChat ID: A15810086985), to start your application journey. Study in China——All China Universities Anhui 安徽 【www.studyinanhui.com】 1. Anhui University 安徽大学 http://ahu.admissions.cn 2. University of Science and Technology of China 中国科学技术大学 http://ustc.admissions.cn 3. Hefei University of Technology 合肥工业大学 http://hfut.admissions.cn 4. Anhui University of Technology 安徽工业大学 http://ahut.admissions.cn 5. Anhui University of Science and Technology 安徽理工大学 http://aust.admissions.cn 6. Anhui Engineering University 安徽工程大学 http://ahpu.admissions.cn 7. Anhui Agricultural University 安徽农业大学 http://ahau.admissions.cn 8. Anhui Medical University 安徽医科大学 http://ahmu.admissions.cn 9. Bengbu Medical College 蚌埠医学院 http://bbmc.admissions.cn 10. Wannan Medical College 皖南医学院 http://wnmc.admissions.cn 11. Anhui University of Chinese Medicine 安徽中医药大学 http://ahtcm.admissions.cn 12. Anhui Normal University 安徽师范大学 http://ahnu.admissions.cn 13. Fuyang Normal University 阜阳师范大学 http://fynu.admissions.cn 14. Anqing Teachers College 安庆师范大学 http://aqtc.admissions.cn 15. Huaibei Normal University 淮北师范大学 http://chnu.admissions.cn Please download WeChat app and follow our official account (scan QR code below or add WeChat ID: A15810086985), to start your application journey. Study in China——All China Universities 16. Huangshan University 黄山学院 http://hsu.admissions.cn 17. Western Anhui University 皖西学院 http://wxc.admissions.cn 18. Chuzhou University 滁州学院 http://chzu.admissions.cn 19. Anhui University of Finance & Economics 安徽财经大学 http://aufe.admissions.cn 20. Suzhou University 宿州学院 http://ahszu.admissions.cn 21.
    [Show full text]
  • University of Leeds Chinese Accepted Institution List 2021
    University of Leeds Chinese accepted Institution List 2021 This list applies to courses in: All Engineering and Computing courses School of Mathematics School of Education School of Politics and International Studies School of Sociology and Social Policy GPA Requirements 2:1 = 75-85% 2:2 = 70-80% Please visit https://courses.leeds.ac.uk to find out which courses require a 2:1 and a 2:2. Please note: This document is to be used as a guide only. Final decisions will be made by the University of Leeds admissions teams.
    [Show full text]
  • 2021 ICM Contest
    2021 Interdisciplinary Contest in Modeling® Press Release—April 23, 2021 COMAP is pleased to announce the results of the 23nd annual influence between artists, and to identify revolutionaries. The E Interdisciplinary Contest in Modeling (ICM). This year 16,059 teams Problem asked teams to create a more equitable and sustainable food representing institutions from sixteen countries/regions participated in system. Students were also required to consider the timeline of the contest. Nineteen teams were designated as OUTSTANDING implementation and the obstacles to change for a region. The F representing the following schools: Problem considered the future of higher education by asking students to create a model to measure the health and sustainability of a national Beijing Normal University, China system of higher education. This problem required actionable policies Northwestern Polytechnical University, China to move a country to a healthier and more sustainable system based on Fudan University, China (AMS Award) the components they chose to include in their model and the country Shenzhen University, China (AMS Award) being considered. For all three problems, teams used pertinent data and South China University of Technology, China grappled with how phenomena internal and external to the system Shanghai Jiao Tong University, China (2) needed to be considered and measured. The student teams produced (INFORMS Award 2103649, INFORMS Award 2106028) creative and relevant solutions to these complex questions and built China University of Petroleum (East China), China models to handle the tasks assigned in the problems. The problems (Vilfredo Pareto Award) also required data analysis, creative modeling, and scientific Xidian University, China methodology, along with effective writing and visualization to Renmin University, China (SIAM Award) communicate their teams' results in a 25-page report.
    [Show full text]
  • Chinese Unique Problem of School Climate— Compared with Czech School
    International Journal of Learning and Teaching Vol. 3, No. 2, June 2017 Chinese Unique Problem of School Climate— Compared with Czech School Jia Liu1,2, Bo Zhou2, Qianjun Tang2, and Yang Lei2 1Chengdu Sport University, Chengdu, China 2Palacky University, Olomouc, Czech Email: [email protected], {bo.zhou01, qianjun.tang01, yang.lei01}@upol.cz Abstract—In the light of the four major areas of assessing shape its school climate into the positive and sustained the school climate suggested by National School Climate one. China is a developing country and has its own long- Council, the school climate both in China and Czech rooted time educational tradition; this kind of unique social in its history and local social environment. The school culture would affect the small school climate profoundly. climate for Chinese School is always related to the way to In this article, author try to point out the problem of the school, responsibility of the safety, Teacher center, controlling, the ranking of school and the location. The school climate in Chinese school, and compared with the school climate for Czech School, for the difference of the school in Czech, universally and distinctively depend on culture and society, have distinguish issue of the drunker these basic four elements of the school climate. and chaos, high ratio between teacher and student, less pressure and more closely interaction with the city. We can II. SAFETY use each other for reference, but we should know its unique phenomenon. This is to call attention of educator, leader, Ref. [1] Safety refer to three aspect.1.Rules and Norms.
    [Show full text]
  • Download Article
    Advances in Economics, Business and Management Research, volume 71 4th International Conference on Economics, Management, Law and Education (EMLE 2018) Study on the Promotion of Physical Fitness of Primary and Middle School Students in Tibetan Autonomous Prefecture of Garzê from the Perspective of Physical Education in Schools* Chenting Zhu Physical Culture Institute Leshan Normal University Leshan, China 614004 Beiguang Guan** Jingtao Wu Physical Culture Institute Physical Culture Institute Leshan Normal University Leshan Normal University Leshan, China 614004 Leshan, China 614004 **Corresponding Author Abstract—The physical health of primary and secondary of the cause of socialism with Chinese characteristics from the school students has always been the focus of constitution strategic height of the comprehensive implementation of the researchers. The improvement of the level of social and economic scientific development concept and the construction of a development, the popularization and use of information harmonious socialist society1. technologies and smart devices, etc., are all affecting the development of physical fitness of primary and secondary school As an important part of the development of China's students. Primary and secondary school students are individuals socialism, the development of physical fitness of students in at the school stage, the school is not only the main place for the southwestern regions especially the minority nationality learning and living for them, but also an important place for regions plays a vital
    [Show full text]
  • The Effects of Transformational Leadership on Employee Creativity: Moderating Role of Intrinsic Motivation
    Asia Pacific Management Review xxx (xxxx) xxx HOSTED BY Contents lists available at ScienceDirect Asia Pacific Management Review journal homepage: www.elsevier.com/locate/apmrv The effects of transformational leadership on employee creativity: Moderating role of intrinsic motivation * Mohsin Shafi a, , Zoya b, Zheng Lei a, Xiaoting Song c, Md Nazirul Islam Sarker d a Center for Trans-Himalaya Studies, Leshan Normal University, Leshan, China b Sichuan University of Science & Engineering, Yibin, China c Business School, Sichuan University, Chengdu, China d School of Political Science and Public Administration, Neijiang Normal University, Nejiang, China article info abstract Article history: This research aimed to investigate effect of transformational leadership (TL) in stimulating employee Received 18 October 2018 creativity (EC) leading to organizational innovation (OI) and assess the moderating role of Intrinsic Received in revised form Motivation (IM) between TL and EC. The data was collected from 164 supervisor-employee dyads of 31 20 November 2019 Pakistani software firms. A three-step approach to SEM was applied to examine mediator and moderator Accepted 20 December 2019 variables. The findings indicate that the Idealized Influence, Intellectual Stimulation, and Inspirational Available online xxx Motivation have a great influence on OI and EC but Individual Consideration was not found to be significantly related to OI and EC. The findings further proved the positive and significant moderating Keywords: Transformational leadership effect of IM for TL and EC. Thus, through TL style, EC can be promoted with the interactive effect of IM by Employee creativity inspiring employees to think out of the box leading to innovation in the organization.
    [Show full text]